Fresche Bolsters MFA with IBM i Exit Point Coverage Alex Woodie

​Organizations relying on Fresche Solutions’ multi-factor authentication (MFA) to protect their IBM i assets can now implement more fine-grained enforcement by protecting access to IBM i exit points, the company announced recently. The MFA offering also now hooks into enterprise-level MFA solutions.
MFA has emerged as a minimum standard for protecting critical IT assets and data, as well as for preventing ransomware attacks. Even if a cybercriminal were to obtain the user ID and password to access sensitive applications and data, MFA serves as a difficult-to-overcome barrier that slows, if not prevents, them from actually getting into systems.
Fresche Solutions …
The post Fresche Bolsters MFA with IBM i Exit Point Coverage appeared first on IT Jungle. Read More 

Company converting to D365 danielharner

​At that time I was in the IT department in somewhat of a dead in position where I was promised the a new position was going to be created for me but after a few years it was never brought up again.
They assured me that I would have time to learn RPG and because I know multiple other languages, they were sure I’d catch on fast. Read More 

A tester’s winter tale  Resource

​…or how the Grinch stole scripting Once upon a time…Every Tester in Testville liked testing a lot.But the Grinch, who sat north of Development –…
The post A tester’s winter tale  appeared first on Original Software. Read More 

Another way of using an array for the SQL Where clause Simon Hutchinson

​Earlier I wrote a post about how to take data from an array and use it in a SQL Where clause. The method I described was to concatenate the elements of the array into a string, and then use that in the Where clause.
I did mention I had tried an alternative method moving data from the array into a Table and then using it as a subselect in the Where clause. I have been asked several times how I did that, which is what this post is about. Let me state here that what I am going to describe here is not as efficient as the method I described before, which is what you should use.
This alternative program consists of the main body, and two subprocedures. I am going to start by showing the main body:
Read more » Read More 

Verified by MonsterInsights